CVE-2025-26863: Denial of Service in Intel(R) 700 Series Ethernet
Uncontrolled resource consumption in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable denial of service.
AI Analysis
Technical Summary
CVE-2025-26863 is a vulnerability identified in the Linux kernel-mode driver for Intel(R) 700 Series Ethernet adapters, affecting versions prior to 2.28.5. The issue arises from uncontrolled resource consumption within the driver, which can be triggered by an authenticated user with limited privileges. This resource exhaustion can lead to a denial of service (DoS) condition, potentially disrupting network connectivity or degrading system performance. The vulnerability does not require user interaction and does not affect confidentiality or integrity directly but impacts availability. The CVSS 4.0 score of 4.8 (medium severity) reflects the limited attack vector (local access required) and the need for low privileges but no user interaction. The flaw is specific to the Intel 700 Series Ethernet hardware and its Linux driver implementation, indicating that systems running Linux with these network adapters and outdated drivers are susceptible. No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that mitigation may require updating to version 2.28.5 or later once available.
Potential Impact
For European organizations, this vulnerability could disrupt critical network infrastructure, especially in environments relying on Intel 700 Series Ethernet adapters within Linux-based servers or network appliances. The denial of service could lead to temporary loss of network connectivity or degraded performance, impacting business operations, data center availability, and cloud services. Organizations in sectors such as finance, telecommunications, healthcare, and government, which often use Linux servers with high-performance network cards, may experience operational interruptions. Although exploitation requires authenticated access, insider threats or compromised user accounts could leverage this vulnerability to cause service outages. The medium severity suggests a moderate risk, but in high-availability environments, even temporary DoS can have significant operational and reputational consequences.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify all systems using Intel 700 Series Ethernet adapters running Linux and verify the driver version. 2) Apply the updated driver version 2.28.5 or later as soon as it becomes available from Intel or Linux distribution vendors. 3) Restrict local user privileges to minimize the number of users who can trigger the vulnerability, enforcing strict access controls and least privilege principles. 4) Monitor network interface performance and system logs for unusual resource consumption patterns that may indicate exploitation attempts. 5) Employ network segmentation to isolate critical systems and limit the impact of potential DoS attacks. 6) Incorporate this vulnerability into vulnerability management and patching cycles to ensure timely updates. 7) Educate system administrators about the risk and signs of exploitation to enable rapid response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-26863: Denial of Service in Intel(R) 700 Series Ethernet
Description
Uncontrolled resource consumption in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-26863 is a vulnerability identified in the Linux kernel-mode driver for Intel(R) 700 Series Ethernet adapters, affecting versions prior to 2.28.5. The issue arises from uncontrolled resource consumption within the driver, which can be triggered by an authenticated user with limited privileges. This resource exhaustion can lead to a denial of service (DoS) condition, potentially disrupting network connectivity or degrading system performance. The vulnerability does not require user interaction and does not affect confidentiality or integrity directly but impacts availability. The CVSS 4.0 score of 4.8 (medium severity) reflects the limited attack vector (local access required) and the need for low privileges but no user interaction. The flaw is specific to the Intel 700 Series Ethernet hardware and its Linux driver implementation, indicating that systems running Linux with these network adapters and outdated drivers are susceptible. No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that mitigation may require updating to version 2.28.5 or later once available.
Potential Impact
For European organizations, this vulnerability could disrupt critical network infrastructure, especially in environments relying on Intel 700 Series Ethernet adapters within Linux-based servers or network appliances. The denial of service could lead to temporary loss of network connectivity or degraded performance, impacting business operations, data center availability, and cloud services. Organizations in sectors such as finance, telecommunications, healthcare, and government, which often use Linux servers with high-performance network cards, may experience operational interruptions. Although exploitation requires authenticated access, insider threats or compromised user accounts could leverage this vulnerability to cause service outages. The medium severity suggests a moderate risk, but in high-availability environments, even temporary DoS can have significant operational and reputational consequences.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify all systems using Intel 700 Series Ethernet adapters running Linux and verify the driver version. 2) Apply the updated driver version 2.28.5 or later as soon as it becomes available from Intel or Linux distribution vendors. 3) Restrict local user privileges to minimize the number of users who can trigger the vulnerability, enforcing strict access controls and least privilege principles. 4) Monitor network interface performance and system logs for unusual resource consumption patterns that may indicate exploitation attempts. 5) Employ network segmentation to isolate critical systems and limit the impact of potential DoS attacks. 6) Incorporate this vulnerability into vulnerability management and patching cycles to ensure timely updates. 7) Educate system administrators about the risk and signs of exploitation to enable rapid response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2025-02-21T04:00:25.898Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689b7751ad5a09ad0034936e
Added to database: 8/12/2025, 5:18:09 PM
Last enriched: 8/20/2025, 1:45:40 AM
Last updated: 9/1/2025, 11:42:07 AM
Views: 11
Related Threats
CVE-2025-9573: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TYPO3 Extension “Backup Plus”
HighCVE-2025-41031: CWE-863 Incorrect Authorization in T-INNOVA Deporsite
MediumCVE-2025-41030: CWE-863 Incorrect Authorization in T-INNOVA Deporsite
MediumCVE-2025-41690: CWE-532 Insertion of Sensitive Information into Log File in Endress+Hauser Promag 10 with HART
HighCVE-2025-44017: Insertion of sensitive information into sent data in Gunosy Inc. "Gunosy" App for Android
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.